The Internet is intended for use by mature adults (and by minors when supervised by mature adults). Our customers are expected to use the Internet with respect, courtesy, and responsibility, giving due regard to the rights of other Internet users. The customer is expected to have a basic knowledge of how the Internet functions, the types of use which are generally acceptable, and the types of use which are to be avoided. Common sense is the best guide as to what is considered acceptable use.
Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted software, violation of US export restrictions, harassment, fraud, trafficking in obscene material, drug dealing, and other illegal activities.
Abuse of Internet or System Resources.
Net abuse, including but not limited to activities such as using a nonexistent E-mail return address on a commercial solicitation, spamming (sending unsolicited advertising to numerous E-mail addresses or newsgroups and/or generating a significantly higher volume of outgoing E-mail than a normal user), trolling (posting outrageous messages to generate numerous responses), mailbombing (sending multiple messages without significant new content to the same user), subscribing someone else to a mailing list without that person's permission, cross-posting articles to an excessive number of newsgroups, or attempting without authorization to enter into a secured computer system. Vital Net Ventures reserves the right to determine what constitutes net abuse.
Tortious conduct, including but not limited to posting of defamatory, scandalous, or private information about a person without their consent, intentionally inflicting emotional distress, or violating trademarks, copyrights, or other intellectual property rights.
Misuse of System Resources.
Misuse of system resources, including but not limited to employing posts or programs which consume excessive CPU time or storage space; permitting use of mail services, mail forwarding capabilities, POP accounts, or autoresponders other than for the customer's own account; or resale of access to CGI scripts installed on our servers.